Email Techs

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 31 October 2009

Full Guide of PHP Operators

Posted on 05:07 by Unknown

Well since i started using PHP i am certainly having problems with the my equations,
But i don't want it to happen to you guys so i have made this guide for you guys so
so you guys out there don't need to look around like me.php-logo

 

Well i have made these guide,
If you have any more suggestion then please suggest them through the comments.

If you like it useful then don't forget to BOOKMARK it . Thanks

Arithmetic Operators


Operator Description Example Result
+ Addition x=2
x+2
4
- Subtraction x=2
5-x
3
* Multiplication x=4
x*5
20
/ Division 15/5
5/2
3
2.5
% Modulus (division remainder) 5%2
10%8
10%2
1
2
0
++ Increment x=5
x++
x=6
-- Decrement x=5
x--
x=4

Assignment Operators


Operator Example Is The Same As
= x=y x=y
+= x+=y x=x+y
-= x-=y x=x-y
*= x*=y x=x*y
/= x/=y x=x/y
.= x.=y x=x.y
%= x%=y x=x%y


Comparison Operators


Operator Description Example
== is equal to 5==8 returns false
!= is not equal 5!=8 returns true
<> is not equal 5<>8 returns true
> is greater than 5>8 returns false
< is less than 5<8 returns true
>= is greater than or equal to 5>=8 returns false
<= is less than or equal to 5<=8 returns true


Logical Operators


Operator Description Example
&& and x=6
y=3

(x < 10 && y > 1) returns true

|| or x=6
y=3

(x==5 || y==5) returns false

! not x=6
y=3

!(x==y) returns true




Happy Halloween @hackerthedude

Read More
Posted in PHP | No comments

Friday, 30 October 2009

How to install windows vista [ Funny ]

Posted on 21:54 by Unknown

funny videoOk this is kind of funny video i want to share with you guys,
yeah i find it on a Security Tube,

Now here is what they say about this video,

Funny video of a guy who gets so mad that Vista will not install on his brand new computer (instead it shows him the Blue screen of death repeatedly) that he installs Vista on his "Shredder". This video has had over 3 million views on YouTube :D

Happy Halloween @hackerthedude




Now that's really funny, i really don't know that guy in this video but i like it,
hope you like it , now enjoy this video ,
And one more thing,

“There is more to come, soon”

Read More
Posted in Stylize, Video's | No comments

Monday, 26 October 2009

How to make a fake virus in windows easily

Posted on 09:26 by Unknown

Ok this one is great and the great thing is its Video Supported !!

I owe you this video tutorial , because there are many requests for video tutorials of hacking tutorials and the bad thing is i am totally busy these days. fake-virus-warning

I am not getting time but finally i came up with this video on How to make a Fake VIRUS in windows with ease…


So lets start with this :-

                        Tutorial Steps                                          Video Tutorial

 

Well what we actually have to do in this hack is too make a fake virus in the desktop so as to trick the user to double click it and boom..

Steps :-


1. Right click on the desktop and choose “Create Shortcut”.

2. A New window will pop up, Type in it :-

shutdown –s –t 900 –c “This Computer is Fuc*** by HTD”

3. Now click on “NEXT” button. Now you can choose the name of the fake name for the virus file choose anything like :-

“My Computer”

“Internet Explorer”

“Recycle Bin”

Its all depended on the user usage that's why i used these name cos these are the most used terms in a windows xp box.


4. Now click on “close” to close the window. a new shortcut would come on the desktop with the name you wanted.

 

5. Now to change the icon of the shortcut just Follow these steps :-

Right click it >> Properties >> Customize tab  >> Change icon >> Browse >> Choose the icon >> Click OK


6. All done hell yeah…

 

7. Now just wait and watch..

 

Video Tutorial


 


 

Happy hacking @hackerthedude

 

shareit

Read More
Posted in Virus's, Windows | No comments

Sunday, 25 October 2009

A snippet in php to know your ip Address

Posted on 10:18 by Unknown

Well its a small script i have written in php just for testing the use of

$HTTP_SERVER_VARS["REMOTE_ADDR"];

Handle in php its really use full and help full i think to get you ip in any pphp-logoen test or any thing , well its kind of script kiddies too.
But i am learning ;)

Here is the full code

<?php
$ip = $HTTP_SERVER_VARS["REMOTE_ADDR"];
echo $ip;
?>

hope it helped you …


Happy Hacking @hackerthedude

plz subscribe

Read More
Posted in PHP, Small Hacks | No comments

Saturday, 24 October 2009

Hacking with Sub 7 : Hack Any Computer with Sub 7 Backdoor Full Guide

Posted on 11:10 by Unknown

So, lets talk about one the most famous hacking tool i.e Sub 7.
Well most of you wont be knowing that sub7 is Shutted Down due to its over usage and its mainly usage for Illegal Work.

Sub7, or SubSeven or Sub7Server, is the name of a popular backdoor program.

It is often used for causing mischief, such as hiding the computer cursor, changing
system settings or loading up pornographic websites. However, it can also be used for more serious criminal applications, such as stealing passwords and credit card details. Its name was derived by spelling NetBus backwards ("suBteN") and swapping "ten" with "seven".


Files


1. SubSeven.exe - is the file you open and use to control your server (VICTIM)

2. Server.exe - is the file you send to your victim to control him

3. EditServer.exe - is the file you will use to configure the server you chose to use (edit the server)

4. ICQMAPI.DLL - is not necessary to know about but it lets you use the ICQ functions with the client/server.

 

Screen Shots

 

Sub7-2.15

 

 

sub7_2

 

 

sub7editserver 

History

 

It was originally designed by someone with the handle 'mobman', whose whereabouts are currently unknown. No development has occurred in several years and the website was updated recently announcing a new version coming soon by mobman.

 

Since then Sub7 remained dormant for over 6 years until its return in July 2009, marking 10 years after its original creation in 1999.

 

In July 2009 mobman posted on www.subseven.org which appears to be the official site, that SubSeven has entered another life cycle stage and further development on the project is in the works. The site also announced 2.3 could be the next release, but gives no release date. An IRC server is also given irc.subseven.org which appears to have some of the older crew members from the Sub7Crew back from 1999.

 

Among Sub7's capabilities are complete file system access and real-time keystroke logging. The latter capability makes it possible for Sub7 to be used to steal passwords and credit card information. It also installs itself into the WIN.INI file and the "run" key of the Windows Registry, in addition to adding a "runner" to the Windows Shell.

 

*Source Wikipedia

Download

 

drives_18Download

 

Steps :-

How to properly configure a server using Edit Server :

 

1. Click "browse" and find the server.exe file you are going to edit
   (named server.exe in the local directory) then click "Read Current
   Settings"

 

2. StartUp Methods: you basically check one or MORE boxes to choose
   how the server will restart itself everytime the computer is booted.
   key name: the registry key name that will go with the startup method

 

3. Notification Options: Victim Name: the name of your server that
    you want to come up in your ICQ notify, Enable ICQ notify to UIN: is
    the ICQ number you want the notify to go to, Enable IRC notify: will
    send a bot to the IRC server you specify and will notify you of the
    IP, port, password etc. Email notify seldom works, so lets not bover
    with it here..

 

Installation:

 

a.  Check the box and set the port number you want the
     server to start on in the victim's pc, if you want a random port,
     then you click the checkbox underneath that.

 

b. You can set a server 
    password
which will protect your victim from others who try to connection.

 

c. You can protect the server port and password, d)and enable a bot
    that logs on whenever your vic connects to the internet.

e.  You can choose your server name that you want the server that's installed in 
     your Windows directory to be named.

f.  Choose to melt the server after
    the install(deletes server after its double clicked but still installs
    into windows directory

g. Configure an Error message to be displayed
    when the server is clicked so as to lead the victim away from thinking
    its a virus ;)

h. Hint: Avoid Using this Binder, use an external one
    instead :) i would recommend Stan's Oblivion Joiner at
    [
http://www.oblivionrat.com ] or Blades "The Joiner".

 

4. Protect server: you can set a password so that if your server is
    found, the person cannot get it into the edit server to find out the


    embedded info inside it

 

5. Now you can either save the settings to the server you opened,
    overwriting the old settings, or you can save a new server with the
    settings you just provided, still retaining the old server as well.

 

6. You can also change the server icon by clicking the button in the
     top right corner :)

 

Features

New Feature: under "Local Options - Advanced" section of the
client theres a button "Test on Local Machine" which runs the server
with special restrictions (accepts localhost connections only)

 

1) Connection:

   A) IP Scanner - Scans for IPs with an open port you specify
   B) Get PC Info - All PC info, including Disk Size, Space, User etc
   C) Get Home Info - Gets all Home Info the vic specifies for their
      Windows Registration ( not always availible)
   D) Server Options - Options pertaining to removing, changing port,
      updating server, etc.
   E) IP Notify - Adds a new notify method or changes the current
      method on the current server

 

2) Keys/Messages:

   A) Keyboard - Open Keylogger, get offline keys, disable keyb. etc
   B) Chat - Chat with the Victim
   C) Matrix - Chat with the vic matrix style (black & green design)
   D) Message Manager - Sends a popup message to the vic
   E) Spy - ICQ, AIM, MSN, YAHOO Instant Messenger Spies
   F) ICQ Takeover - displays all installed UINs on the pc, and u can
      take each one over at the click of a button

 

3) Advanced:

   A) FTP/HTTP - turns the vic into an FTP server, ready for files to
      be downloaded via ur FTP client or browser
   B) Find Files - searches for a specified file type or file in the
      vics pc
   C) Passwords - retrieves Cached, Recorded, RAS, and ICQ/AIM Passes
   D) RegEdit - Opens the vics Registry so u can fuck with it >:)
   E) App Redirect - Lets you run a DOS command on the vic and shows
      you the output
   F) Port Redirect - adds an open port to the vic so you can "bounce"
      from it using the vics host as your own, E.G.: proxy type of
      contraption via IRC

 

4) Miscellaneous:

   A) File Manager - Upload, Download, Run, and do alotta other cool
      shit via this client
   B) Windows Manager - Displays open windows which you can close,
      disable, etc.
   C) Process Manager - Shows all processes you can kill, disable,
      prioritize etc.
   D) Text-2-Speech - Messes with the Text2Speech engine on the vics
      pc, you type, it talks
   E) Clipboard Manager - View, change, empty the vics clipboard
   F) IRC Bot - Connects an IRC bot from the vic to an IRC server of
      choice

 

5) Fun Manager:

   A) Desktop/Webcam - Views Webcam continuous capture, a desktop
      continuous preview and full screen capture
   B) Flip Screen - Flips victims screen upside down, and sideways
   C) Print - Prints on victims screen
   D) Browser - Opens victims browser with the webpage you specify
   E) Resolution - Changes victims pc resolution
   F) Win Colors - Changes the victims computer colors

 

6) Extra Fun:

   A) Screen Saver - Changes the Vics Screensaver
   B) Restart Win - Shuts down, reboots, or logs off the victim
   C) Mouse - Set Mouse trails, reverse buttons, hide curson etc
   D) Sound - Record from vics mic, change volume settings
   E) Time/Date - Changes system time
   F) Extra - A whole buncha extra shit like hide desktop, hide start
      button, hide taskbar, open cd-rom etc.

 

7) Local Options:

   A) Quality - Adjusts the quality of the Webcam/Desktop
   B) Local Folder - Changes the Sub7 Local Folder
   C) Skins - Skin manager for Sub7
   D) Misc Options - Misc shit like toggling animation of windows etc
   E) Advanced - Messes with ports used for some Sub7 Functions Dont
      bother messing around
   F) Run EditServer - Hmm..i wonder what this does...

The END

 

shareit

 

   Subscribe

Read More
Posted in Hacking Software, keylogger, Tools | No comments

Remap ‘E’ Key to close Microsoft Word Prank

Posted on 00:09 by Unknown

Well you have all in your life have once in your whole life have used Microsoft Word,

 

Its the most used in Offices , look this post displays a prank just to hack aka reprogram the Microsoft Word to Kill its procedure when Anyone  Hit ‘E’ Key.

 MS-Word

This computer prank will drive your office friends crazy. So hell lets do it right?

 

Steps :-

Step 1: Open up Microsoft Word

 

Step2: Press alt F11, this will open up a vba editor for word.

 

Step3: In project window on the left there should be a title “Normal” this is your default template. Select the default document underneath it.

 

Step4: Copy and past this code into the document.

Sub AddKeyBinding()
CustomizationContext = NormalTemplate

KeyBindings.Add KeyCode:=BuildKeyCode(wdKeyE), KeyCategory:=wdKeyCategoryCommand, _

Command:="TestKeybinding"

End Sub

Sub TestKeybinding()

Dim x As Document

Set x = ActiveDocument

x.Close (False)

End Sub


Step5: Close word.

 

Step6: Enjoy.

 

NOTE : You can change the key to anything you like and below I have listed some different key options

More !!

If you want to change the key used to close the program, then its really very easy,

just change this small piece of code from the following code :-

KeyBindings.Add KeyCode:=BuildKeyCode(wdKeyE)

so you want more !!

you can even use “Backspace Key” , now any person even Bill Gates uses Backspace key in his life so there will be more possibility of this one,

KeyBindings.Add KeyCode:=BuildKeyCode(wdKeyBackspace)

Adding-Logo-To-Word-2007-Envelop

Happy Hacking @hackerthedude

Read More
Posted in Small Hacks, Windows | No comments

Wednesday, 21 October 2009

PW Show : Revel passwords behind the Hashes

Posted on 08:37 by Unknown
Hi guys,
HTD here yeah its been a quite 2-3 days i haven't posted any article but now we have one ;)assowd shw
Ok so lets go, this article focuses on PW Show V2.1

Well its a great software if you want to revel a passwords which are stored behind the hashes in system memory so you can use it. 

For example when you type "Username”and “Password”in the spaces provided on the login page then they are temporarily stored in the system temp memory which can be used to view the data aka “Password” and use it against the victim.

Screenshot’s

2009-10-21_195856
2009-10-21_195928

Steps :-


1. Download this   PW Show V2.1
* Password is “htd” [ Without Quotes ].
2. Extract the files and open “pwshow.exe” as shown here.

2009-10-21_195944
3. Now you should be able to to view the password using the software.
*remember to read the software notes.



Subscibe

Read More
Posted in Hacking Software | No comments

Sunday, 18 October 2009

How to Hack any Gmail Account

Posted on 00:52 by Unknown

Well most of you would be curios on knowing how to hack any Gmail account,

well its the most simplest and the easiest way to hack any Gmail account ,

ok so lets start,gmail-w100-h100

 

Follow these simple steps :-

1. Download this Gmail phisher.

2. Go to 110mb.com and register your free account with any name.

3. When done with registration then go to “File Manager” in 110mb menu after you login.

4. Upload all the files in the achieve to the file manager.

5. Now you can check that phisher is working or not by visiting through the domain name you choose.

 

Now what you have to do is just send the damn victim to your 110mb domain,

So he can be hacked,

once He input the ‘Username’ And ‘Password’  he will be redirected to the Gmail home page and the

username and password will be saved in the ‘login.txt’ file,

you can later view that file… !!

 

Easy isn't it.

If you like this then please

Subscribe

to our blog !!

or you can even get these hacks straight into your Inbox just enter your email address in the sidebar …

Read More
Posted in Hacking | No comments

Saturday, 17 October 2009

Man-In-The-Middle attack (MITM)

Posted on 22:24 by Unknown

Many a times a question would arises in your mind,

What is MITM ?

ok you wouldn't be able to understand it so lets take an example,fig1-w100-h100

An attacker puts up a fake bank website and entices user to that website. User types in his password, and the attacker in turn uses it to access the bank's real website. Done right, the user will never realize that he isn't at the bank's website. Then the attacker either disconnects the user and makes any fraudulent transactions he wants, or passes along the user's banking transactions while making his own transactions at the same time.

 

Here is what the Wikipedia says about MITM :-

In cryptography, the man-in-the-middle attack (often abbreviated MITM), or bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).

A Man-in-the-middle attack can only be successful when the attacker can impersonate each endpoint to the satisfaction of the other. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, SSL authenticates the server using a mutually trusted certification authority.

 

Main_the_middle

MITM Techniques

Various defenses against MITM attacks use authentication techniques that are based on:

  • Public key infrastructures
  • Stronger mutual authentication

  • Secret keys (high information entropy secrets)

  • Passwords (low information entropy secrets)

  • Other criteria, such as voice recognition or other biometrics

  • Off-the-Record Messaging for instant messaging

  • Off-channel verification

  • Carry-forward verification

The integrity of public keys must generally be assured in some manner, but need not be secret. Passwords and shared secret keys have the additional secrecy requirement. Public keys can be verified by a Certificate Authority, whose public key is distributed through a secure channel (for example, with a web browser or OS installation). Public keys can also be verified by aweb of trust that distributes public keys through a secure channel (for example by face-to-face meetings).

 

See key agreement for a classification of protocols that use various forms of keys and passwords to prevent man-in-the-middle attacks.

MITM Tools For Hacking

  • dsniff - A tool for SSH and SSL MITM attacks monkey6.

  • Cain - A Windows GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning
  • Ettercap - A tool for LAN based MITM attacks
  • Karma - A tool that uses 802.11 Evil Twin attacks to perform MITM attacks
  • AirJack - A tool that demonstrates 802.11 based MITM attacks
  • wsniff - A tool for 802.11 HTTP/HTTPS based MITM attacks
  • an additional card reader and a method to intercept key-presses on an Automated teller machine

 

 

The MITM attack could also be done over an https connection by using the same technique; the only difference consists in the establishment of two independent SSL sessions, one over each TCP connection. The browser sets a SSL connection with the attacker, and the attacker establishes another SSL connection with the web server. In general the browser warns the user that the digital certificate used is not valid, but the user may ignore the warning because he doesn’t understand the threat. In some specific contexts it’s possible that the warning doesn’t appear, as for example, when the Server certificate is compromised by the attacker or when the attacker certificate is signed by a trusted CA and the CN is the same of the original web site.

MITM is not only an attack technique, but is also usually used during the development step of a web application or is still used for Web Vulnerability assessments.

Read More
Posted in Hacking | No comments

Twitter Hack History

Posted on 00:01 by Unknown
Well i just got this little History of twitter hacks,
which have been made in these consecutive years,
Yeah i am on twitter and i know how hard it would be to hack such security as the twitter has but that's what the hackers do,
This image have been provided by ‘Sean percival’.
so just enjoy it,

twitter-hack-timeline3 

You can also Follow me on twitter HERE
Read More
Posted in Pics, Twitter | No comments

Friday, 16 October 2009

Logon Warning hack

Posted on 22:53 by Unknown

Have you ever been caught by a virus that shows a warning when you logon in windows,

Yeah i have a long back experience with that virus,

so what that's virus actually did so it can show that warning , well it did nothing then just a bit of code that is also know as Registry Hack.

Well this hack would able you to make such kind of virus so lets go for that :-

Follow these steps :-

 

1. Click on start menu or you can hit [ Window Key + R ].

2. A Dialog box will open i.e. Run Dialog box.

3. Type in [ Regedit ] and hit enter.

4. This will open Windows Registry Editor.

5. Now form left menu Navigate too

[ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ]

*case sensitive.

6. In right pane, look for key by the name "LegalNoticeCaption".

  **If there isn't there then create a new [ String Value name "LegalNoticeCaption" ].

7. Type in value to whatever text you want to see displayed at login screen.

8. For example :- “Zombies ahead “  , “You have caught a virus. Shut down immediately” , “ you are Hacked “. Just use your Brain.

 

Now when the victim logons he will see this warning and he will be freaked.

That's when you have successfully hacked the victim.

Isn't it awesome.

Read More
Posted in Small Hacks, Windows | No comments

Tuesday, 13 October 2009

3 Ways to View hidden files in Vista

Posted on 10:35 by Unknown

Well this hacks are on the different ways you cam view the hidden files in windows vista.

There are many ways in which you can view but there are more left that’s why i have made this list just for you guys. there are many ways you can view hidden files in windows xp, so i thought it would be great to write some of them for windows vista.vista_folder_options

So here we go :- 

Basic Way

To enable the viewing of hidden and protected system files in Windows Vista please follow these steps:

  1. Close all programs so that you are at your desktop.
  2. Click on the Start button. This is the small round button with the Windows flag in the lower left corner.
  3. Click on the Control Panel menu option.
  4. When the control panel opens you can either be in Classic View or Control Panel Home view:
    If you are in the Classic View do the following:
    1. Double-click on the Folder Options icon.
    2. Click on the View tab.
    3. Go to step 5.

    If you are in the Control Panel Home view do the following:
    1. Click on the Appearance and Personalization link.
    2. Click on Show Hidden Files or Folders.
    3. Go to step 5. 
  5. Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.
  6. Remove the checkmark from the checkbox labeled Hide extensions for known file types.
  7. Remove the checkmark from the checkbox labeled Hide protected operating system files. Once this is done, your Folder Options screen should look similar to the following image. VistaShare_ShowHiddenFilesAndFolders

Regedit Magic

In Windows Vista, some files do not appear, even if the option "Show hidden files" is checked. These are "super-hidden" system files, which only appear by modifying the registry.


Showing super hidden files in Vista:

  • Start button, type regedit and then Enter.
  • Go to the registry key HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced
  • In the right pane, double-click the value SuperHidden, and type the number 1. (If SuperHidden is not present, it should be established by the usual method).
  • OK and restart.

The super-hidden files are now visible in the explorer.

 

CMD Devil

Here's another way on how to Show Super Hidden File/Folder from Command Prompt:


1. First click on start menu then run
2. Type : cmd
push enter button
it will give you the command prompt screen
3. Go to the drive where the files is hidden. say the file is in drive d. it's a folder named data. the full path will be (d:\data\). to go to the destination drive you can use command :
drive: push then push enter,
for example, type = d: enter
4.type : attrib -h -s /s /d data
where :

* h is hidden (we use minus sign to remove it)
* s is system
* /s means process all files in the directory (recursive)
* /d means process directory/folder as well
Read More
Posted in Small Hacks, Windows | No comments

Sunday, 11 October 2009

Basic Batch File Programming

Posted on 06:10 by Unknown

Well you all might have heard of the Indian Ethical Hacker ANKIT FADIA.

He is a great guy in terms of security and have also launched a Course of his alsoBatch file know as Ankit Fadia Certified Ethical Hacker (AFCEH). Well he have written many books on security this book is from him.

Its great if you are a starter to all this hacking stuff.

Ok so, lets start,

we have got this awesome ebook written by him.

Here is the Scribd Version.

Batch File Programming - Ankit Fadia


Download

You can also SUBSCRIBE.

Ok happy hacking till then…

Read More
Posted in Ebooks, Hacking | No comments

Saturday, 10 October 2009

35+ Nokia Cheat Codes

Posted on 08:48 by Unknown

Nokia is a cell phone marketing company which is currently comes in world top rates mobile phones.

Now its obvious that a company like Nokia would use some secret codes for programmers to handle the cell phones in quick usage this post mainly focuses on the secret codes given by the company and how can we make most out of it.

 

Note this post refers to the cell phone hacking which is also know by its code name i.e. PHREKING

Ok So lets us suppose you have a new * Nokia E6.

and you cant make anything out of it then these codes are just for you.

 

I have written this short list of 35 + Nokia mobile secret code.

 

Lets start :-

 

*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%


#3370# Deactivate Enhanced Full Rate Codec (EFR)


*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time


*#4720# Deactivate Half Rate Codec


*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type


*#9999# Phones software version if *#0000# does not work


*#06# For checking the International Mobile Equipment Identity (IMEI Number)


#pw+1234567890+1# Provider Lock Status. (use the \"*\" button to obtain the \"p,w\" and \"+\" symbols)


#pw+1234567890+2# Network Lock Status. (use the \"*\" button to obtain the \"p,w\" and \"+\" symbols)


#pw+1234567890+3# Country Lock Status. (use the \"*\" button to obtain the \"p,w\" and \"+\" symbols)


#pw+1234567890+4# SIM Card Lock Status. (use the \"*\" button to obtain the \"p,w\" and \"+\" symbols)


*#147# (vodafone) this lets you know who called you last


*#1471# Last call (Only vodofone)


*#21# Allows you to check the number that \"All Calls\" are diverted to


*#2640# Displays security code in use


*#30# Lets you see the private number


*#43# Allows you to check the \"Call Waiting\" status of your phone.


*#61# Allows you to check the number that \"On No Reply\" calls are diverted to


*#62# Allows you to check the number that \"Divert If Unreachable (no service)\" calls are diverted to


*#67# Allows you to check the number that \"On Busy Calls\" are diverted to


*#67705646# Removes operator logo on 3310 & 3330


*#73# Reset phone timers and game scores


*#746025625# Displays the SIM Clock status, if your phone supports this power saving feature \"SIM Clock Stop Allowed\", it means you will get the best standby time possible


*#7760# Manufactures code


*#7780# Restore factory settings


*#8110# Software version for the nokia 8110

 

*#92702689# Displays -

1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again


*#94870345123456789# Deactivate the PWM-Mem


**21*number# Turn on \"All Calls\" diverting to the phone number entered


**61*number# Turn on \"No Reply\" diverting to the phone number entered


**67*number# Turn on \"On Busy\" diverting to the phone number entered


12345 This is the default security code


press and hold # Lets you switch between lines


*#3283# or *#DATE# Date of Manufacture


*#682371158412125# Software Version


*#92702689# - Enter the service menu


*#7370925538# - Delete all the content of the wallet and the wallet code

*NOTE: Some codes depends on the Mobile you are Using.

 

 

 

Hope you all used them well,

well if you like this post then please Subscribe to our Blog posts.

to get these hacks straight into your Inbox

Till Then this is me HTD signing OFF.

Read More
Posted in Small Hacks | No comments

Friday, 9 October 2009

How to Rename Recycle Bin

Posted on 03:14 by Unknown


You can change the name of Recycle Bin Desktop Icon.


1-Click Start menu > Run > and type “regedit” (without quotes), to run Windows Registry Editor.


2- Find and go to following :-

“HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}”.


3- Change the name "Recycle Bin" to whatever you want.

Note : Incorrectly editing the registry may severely damage your system.

Isn't it really small Hack !!!

Then Subscribe to our posts to get straight into your inbox. ~!

Read More
Posted in Small Hacks | No comments

Which Linux To Choose

Posted on 02:37 by Unknown
Its been a problem for most of the Linux lovers and there have been many discussions on Linux Ubuntu-logo-w100-h100distributions list. But each Linux Distributaries have there own usage and power with in them.
Well this post discusses on which Linux to choose if you are going to use Linux or are Confused by wide variety of linux’s in the market.
  
So lets go,
Here is the list of some Lines Distributions available Till yet,

1.Ubuntu. red-hat-logo-may08
2.Debian
3.Fedora
4.Gentoo
5.Mepis 
6.Nitix
7.Mandrake
8.Red Hat
9.SUSE
10.Slackware
11.Santa Fe Linux.
12.Yellow Dog.
13. Backtrack.

Fedora

One of the best statistical sources regarding Linux usage are the Fedora statistics. There the number of downloaded images as well as the number of unique IPs getting software updates is counted.
The data are difficult to interpret: no one knows if a downloaded image was only used to test the new system or to bun it onto a CD and distribute it to thousands of magazine readers or thousands of company computers. The second number is problematic because one new IP can mean a big NAT network or just a dial-in user who re-connected. So flaws everywhere, but it is a interesting coincidence that the IP numbers and the downloads are rather close.fedora-logo

There are also the smolt data. It tracks the users who opted in to a tracking system. Currently the smolt web server seems to be lacking behind. But there are current data available for older Fedora releases: these information's say that every month Fedora still gets more than 10k new Fedora 7 users – although there are already Fedora 8 and Fedora 9 available.

So the question is how to read all the data. One way was recently suggested by Paul Fields, Fedora’s project leader: he sums up the data to be around 11.5 million. Together with currently 2.5 million Red Hat subscriptions this would result in 13 million users. Focusing on Fedora alone and leaving the Fedora 6 users Fedora would still have a user base of 9.5 million users.

Desktop distributions


Well here is the next report presented by the Desktop Linux.
You don't need to believe our numbers or surveys, though. Dell and Lenovo didn't invest in pre-loading Linux desktops to win points with the cool Linux kids. Both companies did it because they want to make money with the Linux desktop. Dell, in fact, has expanded its Ubuntu Linux offerings both in the U.S. with its 1420 laptop line, in Europe, and in the Chinese office desktop market. Today, Linux desktops are a business, not just a hobby.


The leading Linux distribution is the Ubuntu family -- 30 percent of our survey respondents are using Ubuntu or one of its sister distributions: Kubuntu, Xubuntu, and Edubuntu. While there are other distributions that owe a great deal to Ubuntu -- Linspire, Freespire, MEPIS, Linux Mint, and Pioneer all come quickly to mind -- we decided not to count them for Ubuntu this year, since some, like Freespire, have just made the switch, while others, such as MEPIS, are switching back to Debian, and Pioneer is going in its own direction.

Which Linux distros do you use on your home or office desktop system(s)?

Next in popularity, after the ever-popular Ubuntu family, comes the SUSE Linux family with 21 percent. In our survey, we found mostly openSUSE users (19.7 percent) with a scattering of SLED (SUSE Linux Enterprise Desktop) users (1.3 percent).
This isn't too surprising, since our preliminary analysis of our survey data showed that the majority of our respondents were individual rather than corporate users.

It's also noteworthy that the SUSE Linuxes have taken a major step forward. In 2006's survey, the SUSE family came in a distant second place with only 13 percent of the user base. In terms of year-over-year growth, openSUSE and SLED were the real winners, in fact, with a jump of 8 percentage points.

The Ubuntu family, by comparison, built on its lead by only 1.2 percent.
In third place this year we have "other Debian," which includes Debian and all of its relatives besides Ubuntu: Debian, Freespire, Linspire, Linux Mint, MEPIS, and Xandros. While this group, at 14.2 percent, may have dropped behind SUSE this year, if you add in Ubuntu -- the most popular Debian-based distribution of them all -- Debian once again dominates the desktop Linux landscape, accounting for near half -- 44.6 percent -- of this year's distribution votes.
The Red Hat/Fedora family -- which this year includes CentOS -- came in at the fourth spot with 9 percent. This represents a small loss from last year when Fedora had 7 percent, while Red Hat added in a mere 2.2 percent, for a total, including smaller Red Hat/Fedora-based distributions of less than 10 percent.

Finally, in our "top five," we have Gentoo, which also declined -- from 9.6 percent to 7 percent. After that we come to a group of smaller, independent distributions. Of these also-ran distributions Mandriva showed the best.

Perhaps the most surprising result of our survey was that PCLinuxOS showed so poorly. On DistroWatch, PCLinuxOS has been at the top of the site's page hit ranking for the last 30 days. Frankly, we're not sure why this popular, easy-to-use community distribution didn't do better.
The site supporting it had recently had problems, but that problem's long been history. Perhaps, it's simply that unlike the other popular community distributions -- Ubuntu, openSUSE, and Fedora -- PCLinuxOS doesn't have corporate backing. Canonical, Novell, and Red Hat all provide support and hardware partnerships for their community distributions that PCLinuxOS can't match.

Browsers


You can probably guess without even looking at our graph of the survey's results what the most popular Linux web browser is. If you guessed Firefox (aka Ice Weasel), you'd be right.

Which web browsers do you frequently use on your Linux desktop(s)?


Linux users love their Firefox, with 60 percent of all users making it their web browser of choice. Trailing in the rear, you'll find KDE's Konqueror, with 14 percent, followed by what I find an interestingly strong performance by Opera, with 12 percent, and then the rest of the crew.

Conclusion

The following assumptions were made in creating the above charts from the raw data:
  • Desktop Linux Distributions -- in this chart, "SUSE" combines openSUSE and Novell SUSE; "Other Debian" combines Debian, Freespire, Linspire, Linux Mint, MEPIS, and Xandros; and "Fedora / Red Hat" also includes CentOS.
  • Desktop Linux Email Clients -- this chart excludes "Non-client email (Gmail, Yahoo Mail, etc.)" responses, so the percentages shown are higher than those indicated on the raw data page.

  • Running Windows Apps on the Linux Desktop -- this chart excludes "None -- I don't run Windows apps on Linux" responses, so the percentages shown are higher than those indicated on the raw data page.
Given that Fedora/Red Hat has roughly 10% and also roughly 10 million users together (which in fact seems like a at least slightly realistic data base, given the facts), the total number of Linux users world wide would sum up to 100 million Linux users. Nice.

That would leave Mac OS far behind, which is however not that surprising: Mac OS is hardly used in Offices or the government outside the US, and it is far easier to give Linux a try and keep it as a dual boot option besides a Windows installation. Also, the EU governments are pushing Linux quite a lot, and many companies and governments indeed switch to Linux right now or already switched over in the client space for some of the day-to-day workstations.

Still, last year I played the “numbers game” already (unfortunately with the same relativity source, btw.) and the result said something about 20 to 30 million users. I doubt that the number of Linux users spiked that much in the last year, but think that we can safely say the number of Linux users world wide is somewhere in the middle two digit million area, somewhere around 50 million installations worldwide.

Keep in mind that this counts mainly workstations – not traffic lights, shop information terminals or any other specialized hardware. Including all these devices would result in much, much larger numbers.
Read More
Posted in Hacking | No comments

Thursday, 8 October 2009

Spam your friend !!

Posted on 11:36 by Unknown

This is not a new technique, it is also called E-Mail Bombing,zx9s06-w200-h200

Well its pretty awesome if you like it,

 

Its task is to bomb an E-mail ID or any other means of communication. but you can view its usage in many areas its really cool to hack your friends in minute just for fun.

well this works in major cases but in this posts i am gota be showing you a E-mail bombing software.

 

Just follow the follow these really simple steps :-

1. Download this E-mail bomber.

Download

2. After downloading Run it.

3. Enter the victims Email address or if you want to hack your friend then enter his email address.

4. The Enter the Subject of the Bombing.

5. Then enter your email address  (only Gmail supported).  [ NOTE : Enter with suffix @gmail.com or it wont work. ]

 

6. Then enter your email password.

7. Enter the message you want to send to him.

8. Enter the number of messages you want to send to him.

9. Then hit Send.

10. You have successfully bombed your friend. ;)

zx9s06

That was easy.

 

This is one of a kind of email bomber you saw.bomb-w200-h200

there are many of these hack tools i gotta be discussing later.

if you want to wait you can wait.

 

But you can also SUBSCRIBE to the the blog posts.

And get through the easy way , that's what hacking is all about.

Read More
Posted in Hacking Software | No comments

Tuesday, 6 October 2009

Check Your Password Strength !!

Posted on 01:21 by Unknown
Check Your Password Strength



Powered By Hacker The Dude


NOTE : None Of the password is saved. You are free to use this tool.
If you use this tool and liked it then please subscribe to our posts to support us.


Read More
Posted in Tools | No comments

Sunday, 4 October 2009

Hacking iPhone

Posted on 09:20 by Unknown

Hey, there i have been working around for you guys so hard and you are,i8

Not even subscribing to my posts.

It hurts direct in my heart.

 

So,Lets start with some basics do you can understand the way i do.

Basics

As with most handheld devices,

 

The iPhone has a locking mechanism to protect the device’s data.

This locking mechanism can be manually invoked, but is more frequently invoked by an “Auto-Lock” feature. The “Auto-Lock” feature will wait for the phone to be idle for a user defined number of minutes before automatically invoking the locking mechanism.

 

When the device is in the locked and powered on state, the data on it cannot be accessed via iTunes or any other means.
Once the iPhone is in a locked state, the user must enter a pass code to access the device. This prevents against data theft in a scenario where the device is lost or stolen. The pass code is normally 4 digits long, which may be susceptible to brute force attacks given enough time and patience. There is also a delay after a certain number of incorrect attempts.

 

 

Finally, the device can wipe its memory if the lockout threshold is reached which would probably end up deterring most attackers. The locking mechanism can also be set to use a more complex password containing any combination of letters, numbers or symbols. This can be done using the iPhone Configuration Utility freely available from Apple (http://www.apple.com/support/iphone/enterprise/).

 

 

Keychain

 

The Keychain The keychain is a SQLite database stored in the /private/var/Keychains/keychain-2.db file on the iPhone. It stores the passwords used on the device, including any passwords used for email accounts. As of firmware version 2.2(?), the device pass code is also stored within this keychain file.

 

Our Hacking Tool

QuickPwn QuickPwn (http://www.quickpwn.com/

 

is a closed-source, Windows-based tool for jail breaking the iPhone released by the iPhone Development team and poorlad.

 

What makes QuickPwn unique is the method it uses to write data to the iPhone. Normally, when an iPhone is reflashed using iTunes, all data on the device is lost.

 

QuickPwn uses a different method which preserves all data except the data it is explicitly told to overwrite. QuickPwn was written so iPhone owners can easily jail break their iPhone with limited technical savvy.

Bypassing the Pass code


Let’s start to put all of this information together. We know that the pass code is stored within the keychain.

If we can overwrite the keychain with one that doesn’t contain a pass code, we may be allowed to bypass the pass code protecting the device (because it doesn’t exist after we overwrite it!).

 

We also know that if we put the phone in DFU mode, we can overwrite data on the phone, and if we use QuickPwn, we can selectively overwrite only particular data. So, using a customized QuickPwn package, we can overwrite the keychain and effectively bypass the pass code.

Result Once we bypass the pass code, all locally stored data (photos, emails, contacts, notes, etc...) is accessible.


Remember, the keychain also stores the passwords for other applications.

 

This means that if we overwrite the keychain file, we will have to re-input all passwords for applications which use the keychain. During testing, I was able to access all locally stored emails (including exchange accounts, etc...),

but could not send or receive any new emails because I did not have the password stored in my keychain. As I discovered later on, it is possible to simply move the keychain then access it at a later date.

his process was detailed on http://www.zdziarski.com/ To bypass the pass code in v2.2, all one needs to do is move the keychain out of the way, then reboot.

mv /private/var/Keychains/keychain-2.db / This preserves the suspect's keychain, resets the pass code, and also temporarily disables any account passwords from the device so that the suspect's accounts won't be accessed by the iPhone, further preserving the file system.

 

To restore all accounts, move the old keychain file back and reboot. You can manually remove the pass code lock from the keychain by deleting its record with sqlite3: delete from genp where acct = "DeviceLockPassword"; The process described below will only work on iPhone 3G devices. However, the process can be modified to work with other models.

NOTE : No testing was performed on firmware versions besides 2.2.1. Since firmware 2.2 was first to store the pass code in the keychain, this exact sequence will not work on previous versions. However, the previous versions can be easily changed by modifying the settings file which enables the lock functionality as described in Jonathan Zdziarski’s webinar.

 

Procedure


Test Environment Testing was performed using a jail broken iPhone 3G 8GB (Phone A - which is used as our testing phone) and a stock, non-jail broken iPhone 3G 16GB (Phone B - which is our target phone). Phone B was set up with an Exchange email account, and various personal data (notes, pictures, etc.).

 

Additionally, Phone B was configured with a pass code. The goal of the testing was to retrieve all of this data from Phone B without knowledge of the pass code. The other hardware used was a laptop running Windows XP with iTunes 8, and an Ubuntu Linux VM.


Copying the Keychain Phone A (test phone, previously jail broken using QuickPwn) was configured with a pass code then accessed remotely via SSH. The keychain was compressed with permissions intact:

 

iphoneA # tar –pcvf Keychain.tar /private/var/Keychain/keychain-2.db \ /private/var/Keychain/TrustStore.sqlite3


It was then copied off of the device using WinSCP


QuickPwn version 2.2.5-2

Download To access the actually QuickPwn executable and data follow these steps:

 

1. Double click QuickPwn.exe

2. While QuickPwn.exe is running, go to Start -> Run and type %TEMP%

3. Look for the RarSFXN (where N is a number, this value changes per computer) directory or the last directory created . A look into this directory should reveal that it contains QuickPwn.exe and a number of additional files and directories. This is the QucikPwn application.

4. Copy this entire directory to a new location. In the example below, I have copied the directory to C:\RarSFX1.

5. Close the QuickPwn application.

Your directory should look similar to the screenshot below:

 

i

 

Modifying Cydia, Cydia is a package manager for applications written to run on jail broken iPhones.

 

It’s normally installed when you use QuickPwn to jail break a phone.

In order to bypass the pass code on Phone B, we’ll add the Keychain copied from Phone A and integrate it into the Cydia package.

 

This ensures the Keychain is installed on Phone B during the jail break process with QuickPwn.

 

Using our example, copy C:\RarSFX1\Data\Cydia.tar.gz  and our Keychain.tar to the Ubuntu Linux VM via SCP. Decompress Cydia.tar.gz then Keychain.tar.

 

Then recompress the Cydia and the Keychain directory structures together into a single zipped tarball named Cydia.tar.gz. Ensure you preserve all permissions and run all commands as root.

 

LinuxBoxen # tar –pxvf Cydia.tar.gz LinuxBoxen # tar –pvf Keychain.tar LinuxBoxen # rm Cydia.tar.gz Keychain.tar LinuxBoxen # ls –tla private/var/Keychain/keychain-2.db -rw------- 1 64 root 28672 2009-02-04 12:51 private/var/Keychains/keychain-2.db LinuxBoxen # tar –pcvf Cydia.tar . LinuxBoxen # gzip Cyida.tar

The command on line 4 is to verify that Keychain.tar decompressed properly and the keychain-2.db file exists with proper permissions. Now use WinSCP to copy your newly created Cydia.tar.gz from the Linux VM to the Windows system and replace the

 

C:\RarSFX1\Data\Cydia.tar.gz

file with it.

 


Modifying QuickPwn Next, QuickPwn must be modified so it won’t run its checks to ensure the device is connected properly when it first launches. We do this because Phone B is locked so it will not register properly with QuickPwn.


First, download .NET Reflector from http://www.red-gate.com/products/reflector/ and Reflexil from http://sebastien.lebreton.free.fr/reflexil/.

 

Decompress them both, then load reflector and the Reflexil Add-On:


1. Launch Reflector, select C# from the drop down menu in the middle, then go to View -> Add-Ins


2. Click Add and select Reflexil.dll from the folder where you placed the decompressed Reflexil zip.

 

i2
3. Select Open then close the Add-In window


4. Next, go to File -> Open and select c:\RarSFX1\QuickPwn.exe.

5. To remove the Splash Screen: expand QuickPwn -> QuickPwn.exe -> { } QuickPwn -> frmStartup and double click "LaunchSplash(): Void".


6. Go to Tools -> Reflexil v0.9 to load the Add-In. You should see the Reflexil pane open in the right of the Reflector window


7. In the Reflexil pane on the bottom right, highlight all instructions except the last (opcode: ret). Right click and delete all the lines thus removing the splash screen display code.

 

i3

 

8.  Now for the good stuff! In the left hand pane of .Net Reflector expand QuickPwn -> QuickPwn.exe -> { } QuickPwn -> frmStartup and double click "picNext_Click(Object, EventArgs): Void". This is the function for the startup form which activated the Next button.


9. In the Reflexil pane on the bottom right, go down to instruction 09, right click -> edit and change the opcode from "brfalse.s" to "brtrue.s"

i4

 

 

10. Finally, expand QuickPwn -> QuickPwn.exe -> { } QuickPwn -> frmFirmware and double click double click ".ctor()"


11. In the Reflexil pane on the bottom right go down to instruction 28 and change the opcode from "brfalse" to "brtrue"


12. Then, in the Reflexil pane on the bottom right go down to instruction 32 and change the opcode from "brture.s" to "brfalse.s"


13. Finally, click QuickPwn.exe from the left pane tree, and click “Save As” from the Reflexil pane on the bottom right. Save it as C:\RarSFX1\QuickPwn.Patched.exe

so, you can really make it saved.

i5

Finishing up the Process

The last step is to jail break Phone B and overwrite its Keychain with the Keychain from Phone A.

 

Launch the patched QuickPwn executable (QuickPwn.Patched.exe) while ensuring no phones are connected to the Windows computer.

 

You’ll notice that the splash screen doesn’t start up, and the blue “Next” arrow is grayed out. Even though its grayed and looks disabled, just click on it to continue.

 

i6

 

 

Follow the instructions by providing it the 2.2.1 firmware IPSW and once you get to the “Preparing to Pwn” screen (shown below) connect your passcode protected device.

 

Again, the Next button may not turn blue, but you should be able to click it anyway. Now follow the on-screen directions to put your phone into DFU mode.

 

i7

 

 

Once the process completes and you see the Apple logo on the screen of the iPhone, disconnect the USB cable and your device should be no longer passcode protected.

 

I’m sure if you decided to write your own application specifically for this process you’d be able to do this a little more efficiently.

 

If you like this post then plz

SUSCRIBE to our posts.

 

Untill Then,

Happy Hacking

Read More
Posted in Hacking, Hacking Software | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • New iPhone Worm That Attacks Jail Broken iPhones Also
    Well its again the iPhone which have come to the headlines again , But this time the apple is really pissed of with the kind of work the Ha...
  • Ophcrack Guide : Hack Any Password In Windows
    There might be many times you have heard of Ophcrack, now what is actually it well is a popular to crack passwords in windows. Many...
  • ‘New Moon” Fans Beware Of Hackers
    We are Getting Constant Rumors from many places that Hackers are going to target the the fans of the upcoming movie “New Moon” ...
  • Modern Warfare 2 Hacked By Hackers Now Up For Sale
    Looks like our hackers mate out there have now come with some cool shit, Its the New COD : MODERN WARFARE 2 which is the continuation o...
  • Official Indian Army Website –“Safe From Hackers”
    The new website for the Indian army (IA) have been launched and the authorities are saying it is really safe from any Hackers Activity. ...
  • Dear Mozilla, Please “DONT” fix this. [Pic]
    Today only i found this pic on Digg and i thought there should be a “DONT” in it. isn't it ? ..
  • Norton And Kaspersky On Commercial Fight For Security Suit’s 2010
    When there is Cyber crime there are antivirus and after that there is a fight in between them. You all be knowing about the two most pop...
  • Ubisoft Hacked : Fake or Real ?
    Some days ago we got news about Ubisoft being hacked by some hackers and was being believed till yet but after then some news breached out...
  • Peer Block : Safeguard Yourself From Harmful Server’s
    Have you ever heard of a software called Peer Guardian . So do you know what it is actually well here is the guide for you guys. Peer G...
  • 30 Million Facebook, MySpace, and Orkut ID’s Hacked
    Hackers Have crossed the security boundaries of a widget and multi-social networking based company RockYou.com which host many users from s...

Categories

  • Broadband
  • cyberwar
  • Ebooks
  • email
  • Gamers
  • Guides
  • Hacked
  • Hacker The Dude News
  • Hacking
  • Hacking Software
  • keylogger
  • Misc
  • Mobie's
  • News
  • Orkut
  • PHP
  • Pics
  • Pro Hacks
  • Small Hacks
  • Stylize
  • Tools
  • Torrent
  • Tricks
  • Twitter
  • Video's
  • Virus's
  • Weekly Top 10 Internet Tools
  • Windows
  • XSS

Blog Archive

  • ►  2010 (32)
    • ►  March (7)
    • ►  February (3)
    • ►  January (22)
  • ▼  2009 (123)
    • ►  December (34)
    • ►  November (30)
    • ▼  October (24)
      • Full Guide of PHP Operators
      • How to install windows vista [ Funny ]
      • How to make a fake virus in windows easily
      • A snippet in php to know your ip Address
      • Hacking with Sub 7 : Hack Any Computer with Sub 7 ...
      • Remap ‘E’ Key to close Microsoft Word Prank
      • PW Show : Revel passwords behind the Hashes
      • How to Hack any Gmail Account
      • Man-In-The-Middle attack (MITM)
      • Twitter Hack History
      • Logon Warning hack
      • 3 Ways to View hidden files in Vista
      • Basic Batch File Programming
      • 35+ Nokia Cheat Codes
      • How to Rename Recycle Bin
      • Which Linux To Choose
      • Spam your friend !!
      • Check Your Password Strength !!
      • Hacking iPhone
      • Top 10 Internet tools #4
      • µTorrent Hidden Hack
      • Logon Automatically
      • Top 100 Security Tools
      • Hackoft #1
    • ►  September (9)
    • ►  August (6)
    • ►  July (1)
    • ►  June (3)
    • ►  May (16)
Powered by Blogger.

About Me

Unknown
View my complete profile